You are on page 1of 33

CAMPUS NETWORK ARCHITECTURE

Report submitted to the SASTRA Deemed to be University as the requirement for the course

CSE302: COMPUTER NETWORKS

Submitted by

KODEBOYINA YESWANTH BALA KARTHIKEYA


(Reg.No:123004111, ECE)

FEBRUARY 2022

SCHOOL OF ELECTRICAL & ELECTRONICS ENGINEERING


THANJAVUR, TAMIL NADU, INDIA – 613 401

i
SCHOOL OF ELECTRICAL AND ELECTRONICS ENGINEERING
THANJAVUR – 613 401

Bonafide Certificate

This is to certify that the report titled “Campus Network Architecture” submitted as a
requirement for the course,CSE 302:COMPUTER NETWORKS for B.Tech is a bonafide
record of the work done by Shri. KODEBOYINA YESWANTH BALA
KARTHIKEYA(Reg.No:123004111,ECE) during the academic 2020-21,in the School of
Electrical and Electronics Engineering

Project Based Work Viva voce held on ____________

Examiner 1 Examiner 2

ii
ACKNOWLEDGEMENTS

First of all, we express our gratitude to Prof. Dr S Vaidhyasubramaniam, Vice Chancellor,


SASTRA Deemed University, who provided all facilities and constant encouragement during
our study. We extend our sincere thanks to Prof. R.Chandra Mouli, Registrar, SASTRA Deemed
University for providing the opportunity to pursue this project. It is our privilege to express our
sincerest regards to our project coordinator, Dr. K. Thenmozhi, Dean (SEEE), Sridhar K,
Associate Dean (ECE) and Dr. R. John Bosco Balaguru, Dean (Sponsored Research) who
motivated us during the project.

We owe a debt of most profound gratitude to our mentor Dr. A.Rajesh for his valuable inputs,
able guidance, encouragement, wholehearted cooperation and constructive criticism throughout
our project on the topic “CAMPUS NETWORK ARCHITECTURE “.

We take this opportunity to thank all our lecturers who have directly or indirectly helped our
project

iii
List of Figures

No Title Pg.No
1 Network Architecture Design 3

2.1 Overview of Vidyut Vihar 4

2.2 Overview of Chith Vihar 5

2.3 Overview of Other Institutional Services 6

2.4 Overview of VC Room 7

2.5 Overview of ASK 1 8

2.6 Overview of Tifac Core 9

3 Testing VLAN Communications 15

4 DNS Server 16

5 WEB Server 17

5.1 HTML Code for Index 18

5.2 HTML Code for Logo 18

5.3 HTML Code for SmallPage 18

5.4 Webpage of Index 19

5.5 Webpage of SmallPage Link 19

5.6 Webpage of Logo 20

6 FTP Server 21

6.1 Writing Files using FTP 22

6.2 Reading Files using FTP 22

7 Real Time Packet Transfer b/w Dean Cabin and TPO 23

iv
List of Tables

No Title Pg.No
1 Information of Devices used in the Project 2

2.1 IP Addresses of Devices in Vidyut Vihar 4

2.2 IP Addresses of Devices in Chith Vihar 5

2.3 IP Addresses of the Other Devices on the Campus 6

2.4 IP Addresses of the Devices in VC Room 7

2.5 IP Addresses of the Devices in ASK I 8

2.6 IP Addresses of the Devices in Tifac Core 9

v
Abbreviations

DNS Domain Name System


FTP File Transfer Protocol
IP Internet Protocol
LAN Local Area Network
OS Operating System
OSI Open Systems Interconnection
RFP Request For Proposal
RIP Routing Information Protocol
RPP Routing Protocol Plan
VLAN Virtual Local Area Network

vi
ABSTRACT

A campus network is a vital element of life on campus, and network security is critical. The
campus network has difficulties in addressing key security issues that are dictated by network
architecture. The campus network's hierarchical architecture is set with several forms of security
issues to ensure service quality. A college network can be used for a variety of purposes,
including teaching, learning, research, management, e-library, publishing results, and connecting
with other users. Based on the practical needs, a tested and secure network design is proposed in
this project, and this recommended network infrastructure is realizable with adaptable
infrastructure.

One of the key technical challenges of information transmission in campus networks is


constructing a viable, effective, and secure network.

vii
TABLE OF CONTENTS

Title Page No.


Bonafide Certificate ii
Acknowledgements iii
List of Figures iv
List of Tables v
Abbreviations vi
Abstract vii
1.Introduction 1
2.Implementation of the Project 2
3.Proposed Architecture 3
4.IP Addressing Plan 4
1.Vidyut Vihar 4
2.Chith Vihar 5
3.Others 6
4.VC Room 7
5.ASK I 8
6.Tifac Core 9
5.Routing Protocol Plan 10
1.Configuring Routers 11
2.RPP for Router 0 12
3.RPP for Router 1 13
4.RPP for Router 2 14
6.Testing VLAN Communication 15
7.Configuration of Servers 16
1.DNS Server 16
2.WEB Server 17
1.Testing WEB Hosting 19
3.FTP server 21
1.Testing FTP Server 22
8.Real Time Packet Transfer 23
9.Conclusion 24
10.References 25

viii
1.INTRODUCTION

People within a same management structure, such as a house, office building, campus, or region,
can access network services and applications through a local area network (LAN).This project
entails creating a network architecture for a LAN (Local Area Network) for a college, in which
multiple computers from various departments are set up in such a way that they can interact and
communicate with one another by exchanging data. To create a networking situation for a
college that connects several departments to one another and facilitates communication between
them. This architecture is utilized to create a well-organized and well-planned topology that
meets all of the college's requirements (i.e., client).

To begin communication between end user devices and to construct a network, we must first
pick relevant networking equipment such as routers and switches from the packet tracer's
component list, then make physical connections by connecting cables to serial and fast Ethernet
ports. Because networking devices are expensive, it's best to start with a packet tracer to get a
better understanding of the network's concept and behavior.

1
2.IMPLEMENTATION OF THE PROJECT

Different networking devices are used to implement campus network design, including PT
routers, PT switches, DNS servers, FTP servers, WEB servers, computers, laptops, and printers,
as well as Serial DTE and Copper Straight-Through connections. TABLE l also contains
information on the device.

No DEVICE FUNCTION

1 PT ROUTER CORE CONNECTIONS

2 PT SWITCH DEPARTMENT CONNECTIONS

3 DNS SERVER COLLEGE WEBSITE ACCESS

4 FTP SERVER FILE TRANSFER

5 COMPUTERS USER ACCESS

6 LAPTOPS USER ACCESS

7 PRINTERS USER ACCESS

8 SERIAL,DTE AND COPPER LAN CONNECTIVITY


STRAIGHT THROUGH CABLES

9 WEB SERVER COLLEGE WEBSITE HOSTING


TABLE 1

2
3.PROPOSED ARCHITECTURE

FIG 1.Network Architecture Design

3
4.IP ADDRESSING PLAN

4.1 VIDYUT VIHAR(192.168.1.0)

FIG 2.1

Dean Cabin 192.168.1.2


Simulation Laboratory 192.168.1.3
Control System Laboratory 192.168.1.4
Fiber Optics Laboratory 192.168.1.5
Communication Laboratory 192.168.1.6
Printer VV 192.168.1.7
TABLE 2.1

4
4.2 CHITH VIHAR(192.168.2.0)

FIG 2.2

SOC Dean Cabin 192.168.2.2


CV Lab 1 192.168.2.3
CV Lab 2 192.168.2.4
CV Lab 3 192.168.2.5
CV Lab 4 192.168.2.6
Printer CV 192.168.2.7
TABLE 2.2

5
4.3 OTHERS(192.168.3.0)

FIG 2.3

Office 192.168.3.2
Exam Cell 192.168.3.3
Enquiry 192.168.3.4
TPO 192.168.3.5
Printer 2 192.168.3.6
Printer 3 192.168.3.7
Printer 4 192.168.3.8
TABLE 2.3

6
4.4 VC ROOM(192.168.4.0)

FIG 2.4

PC 0 192.168.4.2
Laptop 0 192.168.4.3
TABLE 2.4

7
4.5 ASK 1(128.168.0.0)

FIG 2.5

PC 2 128.168.0.2
PC 3 128.168.0.3
PC 4 128.168.0.4
PC 5 128.168.0.5
Printer 5 128.168.0.6
TABLE 2.5

8
4.6 TIFAC CORE(1.0.0.0)

FIG 2.6

DNS Server 1.0.0.2


WEB Server 1.0.0.3
FTP Server 1.0.0.4
PC 1 1.0.0.5
TABLE 2.6

9
5.ROUTING PROTOCOL PLAN

The Routing Information Protocol (RIP) is a dynamic routing protocol that finds the
optimum path between the source and destination networks by using hop count as a routing
metric. It is a distance vector routing protocol with an AD value of 120 that operates at the OSI
model's application layer.

The number of routers between the source and destination networks is referred to as the hop
count. The path with the fewest hops is deemed the best route to a network and is thus entered
into the routing table. The number of hops allowed in a path between source and destination is
limited by RIP, which eliminates routing loops.

RIP's characteristics

1. Network updates are sent on a regular basis.

2. Routing information (updates) are always broadcast.

3. Routing tables in their entirety are sent in updates.

4. Routing information received from nearby routers is always trusted by routers. This is also
known as Routing on rumors.

10
5.1 Configuration of Routers

Configuring RIP Protocol to Router 0

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router rip
Router(config-router)#network 192.168.1.0
Router(config-router)#network 192.168.2.0
Router(config-router)#network 10.10.0.0

Configuring RIP Protocol to Router 1

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router rip
Router(config-router)#network 192.168.3.0
Router(config-router)#network 192.168.4.0
Router(config-router)#network 10.10.0.0
Router(config-router)#network 20.20.0.2

Configuring RIP Protocol to Router 2

Router>enable
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#router rip
Router(config-router)#network 128.168.0.0
Router(config-router)#network 20.20.0.1
Router(config-router)#network 20.20.0.0

11
5.2 Routing Protocol Plan for Router 0

Router>enable
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile,
B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS
inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

R 1.0.0.0/8 [120/2] via 10.10.0.2, 00:00:14, Serial2/0


C 10.0.0.0/8 is directly connected, Serial2/0
R 20.0.0.0/8 [120/1] via 10.10.0.2, 00:00:14, Serial2/0
R 128.168.0.0/16 [120/2] via 10.10.0.2, 00:00:14, Serial2/0
C 192.168.1.0/24 is directly connected, FastEthernet0/0
C 192.168.2.0/24 is directly connected, FastEthernet1/0
R 192.168.3.0/24 [120/1] via 10.10.0.2, 00:00:14, Serial2/0
R 192.168.4.0/24 [120/1] via 10.10.0.2, 00:00:14, Serial2/0

12
5.3 Routing Protocol Plan for Router 1

Router>enable
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile,
B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS
inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

R 1.0.0.0/8 [120/1] via 20.20.0.2, 00:00:10, Serial3/0


C 10.0.0.0/8 is directly connected, Serial2/0
C 20.0.0.0/8 is directly connected, Serial3/0
R 128.168.0.0/16 [120/1] via 20.20.0.2, 00:00:10, Serial3/0
R 192.168.1.0/24 [120/1] via 10.10.0.1, 00:00:25, Serial2/0
R 192.168.2.0/24 [120/1] via 10.10.0.1, 00:00:25, Serial2/0
C 192.168.3.0/24 is directly connected, FastEthernet0/0
C 192.168.4.0/24 is directly connected, FastEthernet1/0

13
5.4 Routing Protocol Plan for Router 2

Router>enable
Router#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile,
B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS
inter area
* - candidate default, U - per-user static route, o - ODR
P - periodic downloaded static route

Gateway of last resort is not set

C 1.0.0.0/8 is directly connected, FastEthernet0/0


R 10.0.0.0/8 [120/1] via 20.20.0.1, 00:00:13, Serial2/0
C 20.0.0.0/8 is directly connected, Serial2/0
C 128.168.0.0/16 is directly connected, FastEthernet1/0
R 192.168.1.0/24 [120/2] via 20.20.0.1, 00:00:13, Serial2/0
R 192.168.2.0/24 [120/2] via 20.20.0.1, 00:00:13, Serial2/0
R 192.168.3.0/24 [120/1] via 20.20.0.1, 00:00:13, Serial2/0
R 192.168.4.0/24 [120/1] via 20.20.0.1, 00:00:13, Serial2/0

14
6.Testing VLAN Communications

From SOC Dean Cabin to ASK I

FIG 3

15
7.Configuration of Servers

7.1 DNS Server

A DNS server is a computer server that stores a database of public IP addresses and their
associated hostnames, and in most situations, it resolves, or converts, those names to IP
addresses when requested. DNS servers use proprietary software and communicate with one
another via proprietary protocols.

Because it transforms easy-to-remember hostnames like www.google.com to IP addresses like


216.58.217.46, DNS is sometimes referred to as the internet's phone book. This happens behind
the scenes after you type a URL into the address bar of a web browser.

The website you wished to visit is then shown in your web browser after the IP address is
returned.It may appear like there is a lot of back and forth, and there is, but it all happens swiftly,
with minimal delay in sending you to the site you requested.

FIG 4

16
7.2 WEB Server

A web server is software and hardware that responds to client requests via the World Wide Web
using HTTP (Hypertext Transfer Protocol) and other protocols. A web server's primary
responsibility is to show website content by storing, processing, and distributing webpages to
users.

Web server software is accessed via a website's domain name and ensures that the site's content
is delivered to the requesting user. There are various components on the software side, including
at least an HTTP server. HTTP and URLs are understood by the HTTP server. A web server is a
machine that houses web server software as well as other website-related assets including HTML
texts, pictures, and JavaScript files.

When a browser requests a document from a web server, the process is broken down into many
parts. A person will first type a URL into the address bar of a web browser. The domain name's
IP address is then obtained by either translating the URL through DNS (Domain Name System)
or querying the web browser's cache. The browser will be directed to a web server as a result of
this action. The browser will then use an HTTP request to request the appropriate file from the
web server. The web server will react by delivering the requested page to the browser through
HTTP once more. The web server will respond with an error message if the requested page does
not exist or if something goes wrong.

FIG 5

17
FIG 5.1

FIG 5.2

FIG 5.3

18
7.2.1 Testing WEB Hosting

FIG 5.4

FIG 5.5

19
FIG 5.6

20
7.3 FTP Server

The FTP server stores the address of client files and creates a link to share these files. An FTP
server requires a transfer control protocol network or internet protocol network to function. FTP
server connection remains connected to FTP clients all the time. It helps in transferring files from
one user to another via the Internet. Any user can access the data stored in the FTP server, while
some files can be accessed by special users.

It can be thought of as a layer in between the user's system and the data. The file is either posted
or downloaded to the FTP server when you use FTP to transfer it. If the user is uploading data,
the data is sent from the user's system to the FTP server. If the user is downloading data, the data
is transferred from the FTP server to the user's PC.

FIG 6

21
7.3.1 Testing FTP server

FIG 6.1

FIG 6.2

22
8.Real Time Packet Transfer

The below figure shows the real time packet transfer between Dean Cabin and TPO

FIG 7

23
9.CONCLUSION

The proposed system will result in a fail-safe backbone network infrastructure that meets the
needs for quick access to information while also ensuring optimal productivity when using
telecommunication services. The installed technology enabled high-speed wired Internet access
throughout the entire complex of buildings, as well as data transfer of all types through a single
streamlined network.

The Cisco packet tracer simulator software was used to approve the campus area network design.
Because a hierarchical design is utilized to combine devices into numerous levels, this design is
also known as the hierarchical network design. This is simply accomplished using the
hierarchical design, which has been appropriately provisioned for network scalability and
performance.

24
10.REFERENCES

[1] Isiaka Ajewale Alimi. (2015, November 21). Effective Multi-Layer Security for Campus
Network. ResearchGate; Journal of Communications Technology, Electronics and Computer
Science (JCTECS). https://www.researchgate.net/publication/309099723_Effective_Multi-
Layer_Security_for_Campus_Network

[2] Shemsi, I. (2017). Boosting Campus Network Design Using Cisco Packet Tracer.
International Journal of Innovative Science and Research Technology, 2(11).
https://ijisrt.com/wp-content/uploads/2017/11/Boosting-Campus-Network-Design-Using-Cisco-
Packet-Tracer.pdf

[3] Easy. (2021). FTP Server Using CISCO Packet Tracer [YouTube Video]. In YouTube.
https://www.youtube.com/watch?v=Mk5WUsHOK0Y

[4] Gillis, A. S. (2020). web server. WhatIs.com; TechTarget.


https://whatis.techtarget.com/definition/Web-server

[5] Tolga Bagci. (2017, April 20). How to Configure a Network in Packet Tracer -
SYSNETTECH Solutions. SYSNETTECH Solutions.
https://www.sysnettechsolutions.com/en/configure-a-network-in-cisco-packet-tracer/

[6] Router Configuration With Cisco Packet Tracer - GeeksforGeeks. (2021, November 7).
GeeksforGeeks. https://www.geeksforgeeks.org/router-configuration-with-cisco-packet-tracer/

[7]Current, John R., Charles S. ReVelle, and Jared L. Cohon. "The hierarchical network design
problem." European Journal of Operational Research 27.1 (1986): 57-66.

[8]Janitor, J.; Jakab, F.; Kniewald, K., "Visual Learning Tools for Teaching/Learning Computer
Networks: Cisco Networking Academy and Packet Tracer," Networking and Services (ICNS),
2010 Sixth International Conference on, vol., no.,pp.351,355, 7-13 March2010.

25

You might also like